Method Which Exploit Login Credentials Information

Method which network data can be captured & Exploit login credentials information during a penetration test include as follows:

■ Domain name system(DNS) cache poisoning Allows an attacker to replace a victim’s data request with malicious data. An example of an exploit using DNS cache poisoning is pharming.

■ DNS forgery This technique is a timing attack where a false DNS query response is returned to a system before the valid DNS query response returns. An example of an exploit using DNS forgery also includes pharming.

■ User interface (UI) redressing Permits a malicious user to replace a valid link on a Web site with a malicious link, using Web page scripting languages, such as JavaScript. Clickjacking is another term for UI redressing.

■ Border Gateway Protocol (BGP) hijacking This attack involves obtaining IP addresses by exploiting BGP broadcast communication and injecting invalid routing data. IP hijacking is another term for this attack, which is used for spamming or distributed denial-of-service (DDoS) attacks.

■ Port Stealing Layer 2 attack which redirects switch port traffic to the attack system by spoofing the victim’s Media Access Control (MAC) address, thereby overwriting ARP tables in the network. This permits the attack system to intercept any returning communications intended for the victim. This can be used as a DoS attack or used to intercept traffic.

■ Dynamic Host Configuration Protocol (DHCP) spoofing An attack on a DHCP server, which obtains IP addresses using spoofed DHCP messages. It is used to push a valid system off the network by spoofing the victim’s DHCP lease communications. DHCP spoofing is useful in conducting a DoS attack.

■ Internet Control Message Protocol (ICMP) redirection This attack sends ICMP redirects to a victim system, informing the system that a shorter network patch exists. This attack permits attack systems to intercept and forward traffic as a MITM attack.

■ Man In The Middle Attack (MITM) A method of intercepting traffic between two systems by relaying data, which can be clear text or encrypted data. The ability to intercept or passively collect data in a network provides the professional penetration tester a means to obtain login credentials or other sensitive data, which can be used to access the target system with elevated privileges.
We Want You To Know

No comments

Powered by Blogger.